Files
oemcrypto_core_message/oemcrypto/odk/test/fuzzing
Aaron Vaage bee7997487 Manual Code Push
This update brings the partner repo in sync with the internal repo's
commit 040460be8b9556a699a6cd3813c88ce710f68146.
2020-07-23 14:42:42 -07:00
..
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00
2020-07-23 14:42:42 -07:00

ODK Fuzzing

Objective

  • Run fuzzing on ODK and KDO serialize and deserialize APIs using google supported fuzzer engines to find security vulnerabilities. Any issues found by clusterfuzz will be reported to odk fuzz buganizer.

Run fuzz target on local machine

  • In order to run fuzz target locally and see code coverage, save binary input to be tested against fuzz target into a temporary corpus directory and execute following commands

    $ blaze build --config=asan-fuzzer //your:target
    $ blaze-bin/your/target FULL_CORPUS_DIR